Vulnerability Details : CVE-2009-1729
Potential exploit
Multiple cross-site scripting (XSS) vulnerabilities in Sun Java System Communications Express 6 2005Q4 (aka 6.2) and 6.3 allow remote attackers to inject arbitrary web script or HTML via (1) the abperson_displayName parameter to uwc/abs/search.xml in the Add Contact implementation in the Personal Address Book component or (2) the temporaryCalendars parameter to uwc/base/UWCMain.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2009-1729
- cpe:2.3:a:sun:java_system_communications_express:6.3:*:sparc:*:*:*:*:*
- cpe:2.3:a:sun:java_system_communications_express:6.2:*:sparc:*:*:*:*:*
- cpe:2.3:a:sun:java_system_communications_express:6.3:*:x86:*:*:*:*:*
- cpe:2.3:a:sun:java_system_communications_express:6.2:*:x86:*:*:*:*:*
- cpe:2.3:a:sun:java_system_communications_express:6.3:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:java_system_communications_express:6.2:*:linux:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-1729
9.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-1729
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2009-1729
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-1729
-
http://www.coresecurity.com/content/sun-communications-express
Exploit
-
http://www.vupen.com/english/advisories/2009/1389
-
http://www.securityfocus.com/bid/34154
Exploit;Patch
-
http://osvdb.org/54610
-
http://www.securityfocus.com/archive/1/503675/100/0/threaded
-
http://www.securityfocus.com/bid/34155
Exploit;Patch
-
http://securitytracker.com/alerts/2009/May/1022266.html
-
http://secunia.com/advisories/32474
-
http://sunsolve.sun.com/search/document.do?assetkey=1-21-122793-26-1
Patch;Vendor Advisory
-
http://seclists.org/fulldisclosure/2009/May/0177.html
-
http://sunsolve.sun.com/search/document.do?assetkey=1-66-258068-1
Patch;Vendor Advisory
-
http://osvdb.org/54609
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/50658
Jump to